At Protus3, we take great pride in helping our clients identify risks and develop practical and sound strategies to manage, mitigate, and leverage those risks. Usually those risks involve insider or outsider threats carried out by persons with nefarious intent. The threats come in various forms – overt and plainly visible (think intruder) or covert and not plainly evident (think …
CPTED – Security Design Beyond the Acronym
As progressive managers and owners of contemporary organizations search for ways to reduce company losses caused by criminal acts, they are beginning to examine more closely the actual environment in which these crimes take place. Crime Prevention Through Environmental Design (CPTED) as part of a security design can reduce the fear of crime. It can also reduce the actual incidence …
Concealed Carry in the Workplace
Concealed Carry in the Workplace: A Question of Risk Versus Reward No matter how you interpret the Second Amendment, there are few, if any, hot button issues that raise more passion and stoke the fires of liberty infringed like the right to bear arms. Many have called for increased gun control, to include a ban on assault style rifles, universal …
Risk Assessment Teams
We’ve all heard the saying “necessity is the mother of invention” (or innovation). That is absolutely true today. During COVID-19, we have not seen a big shift in how businesses are set up. What we are starting to see is a major shift in multi-disciplined teams working together. As someone who has helped companies develop multi-disciplined risk assessment teams, I …
Remote Monitoring Software and COVID-19
We find ourselves in very unique times. As of April 3, 2020, there are 311 million people in at least 41 states, three counties, eight cities, the District of Columbia and Puerto Rico being urged to stay home. This rapid change has put many employers in a position to allow employees to work from home. Because of that, employers are …
Why Ignore Physical Security?
One thing that has always amazed me is how so many companies choose not to put a sound physical security solution in place. Don’t get me wrong – I understand that there is a cost. Many companies simply cannot afford to devote money to a security program when they need the money elsewhere. With that said, having security systems in …
What is Your Security Culture?
These two signs provide the same basic security advice. What makes them different? The culture of the organization. The sign on the left appears in parking decks owned by the City of Raleigh. Similar signs are found in other municipal, government, and public parking lots and decks. “Lock-Take-Hide” is a good, quick reminder to protect vehicles and property in parking …
Wake Tech AEC Symposium
Protus3 attended the Wake Tech AEC Symposium. Jerry Blanchard, Dana Frentz, and Kevin McQuade represented Protus3. The Wake Tech Facilities Design and Construction team presented the AEC Symposium as a way to showcase upcoming Capital Improvement Projects. Attendees heard from a variety of college speakers and panelists. Topics included Academics & Employment, HUB, Master Planning, Energy & Sustainability, Infrastructure, and …
Two-Factor Authentication: A Resolution That Works
Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …
Integrated Security Program at Institute of Management Accountants
Chris Peterson presented “What is Integrated Security and Why Does it Matter to You?” at the Institute of Management Accountants. An integrated security program operates best when the business and security processes work together in harmony. Starting from the ground up, this presentation addresses creating a solid foundation that facilitates your company’s mission, while integrating and operating a security program …